https://github.com/jamesmoriarty/gomem
A Go library for manipulating Windows processes.
https://github.com/jamesmoriarty/gomem
dll dll-injection exploit external go golang hack kernel32 kernel32-dll reverse-engineering security windows
Last synced: 19 days ago
JSON representation
A Go library for manipulating Windows processes.
- Host: GitHub
- URL: https://github.com/jamesmoriarty/gomem
- Owner: jamesmoriarty
- License: mit
- Created: 2020-04-09T08:43:52.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2021-10-20T10:54:22.000Z (over 3 years ago)
- Last Synced: 2025-03-27T04:51:17.258Z (about 1 month ago)
- Topics: dll, dll-injection, exploit, external, go, golang, hack, kernel32, kernel32-dll, reverse-engineering, security, windows
- Language: Go
- Homepage: https://pkg.go.dev/github.com/jamesmoriarty/gomem
- Size: 55.7 KB
- Stars: 51
- Watchers: 3
- Forks: 7
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# GoMem
  [](https://goreportcard.com/report/github.com/jamesmoriarty/gomem)
A Go package for manipulating Windows processes. Automated tests manipulate and verify their own process memory via Windows APIs.
```go
import "github.com/jamesmoriarty/gomem"// Open process with handle.
process, err := gomem.GetOpenProcessFromName("example.exe")// Read from process memory.
valuePtr, err := process.ReadUInt32(offsetPtr)// Write to process memory.
process.WriteByte(valuePtr, value)
```## Build
```
go build
```## Test
```
go test
```## Docs
[pkg.go.dev/github.com/jamesmoriarty/gomem](https://pkg.go.dev/github.com/jamesmoriarty/gomem)
## Examples
[github.com/jamesmoriarty/gohack](https://github.com/jamesmoriarty/gohack)